Attacks on the neural network and defense methods
Abstract
This article will discuss the use of attacks on a neural network trained on audio data, as well as possible methods of protection against these attacks. FGSM, PGD and CW attacks, as well as data poisoning, will be considered. Within the framework of protection, Art-IBM and advertorch libraries will be considered. The obtained accuracy metrics within the framework of attack applications are presented
- Publication:
-
arXiv e-prints
- Pub Date:
- December 2024
- DOI:
- arXiv:
- arXiv:2412.20529
- Bibcode:
- 2024arXiv241220529K
- Keywords:
-
- Computer Science - Cryptography and Security;
- Computer Science - Artificial Intelligence